Author Archive

Businesses everywhere are falling prey to a deadly enemy: Phishing emails. News broke in the last month alone of data breaches where phishing emails were the main cause. Mercy Iowa City and Mercy Clinics, Kentucky State University and Ryman Hospitality Properties (parent company of the Grand Ole

You’ve undoubtedly heard about the Hollywood Presbyterian Medical Center ransomware attack in Los Angeles – and, unfortunately, turns out it was a foreshadow of more to come after all. Since the highly publicized attack on the Los Angeles-area hospital on Feb. 5, three more ransomware attacks have

The benefits of real-time threat detection visibility are obvious – but what about tracking threat data over periods of time? The overly time-consuming process is usually more trouble than it’s worth. We explored the biggest benefits of tracking network traffic data and how you can track it

Cyber Defense Magazine, the industry’s leading electronic information security magazine and media partner of the RSA® Conference 2016, named ThreatSecure Network, ThreatTrack’s advanced malware protection platform, winner of the Best of Breed in the Network Security Solutions category. The award comes after months of review by leading

Ever wonder what truly makes a successful malware analysis sandbox? Look for these five characteristics in any sandbox tool to ensure you get the best look at how malware is behaving across your network. Easy to Use: A sandbox is designed to add value to your cyber defense –

You may be relieved to hear that new ThreatTrack research reveals many C-level executives have learned their lessons after visiting malware-infected porn sites, but there is another reason for concern – too many still fall for phishing scams. The number actually increased in the last two years.

The dangers of ransomware came to light in full force over recent weeks, and an LA hospital’s decision to pay a $17,000 ransom underscores the growing challenges of securing the corporate network. And the hospital isn’t alone. The rash of ransomware attacks, including a Horry County, South Carolina,

Apple CEO Tim Cook posted a letter to customers in response to the Federal Bureau of Investigation’s (FBI) Feb. 16 order to unlock an iPhone 5c. This phone was used by one of the two shooters who murdered 14 people in a San Bernardino, California, office building

CISOs have been on an uphill climb in the corporate structure for years, and while their struggle is far from over, recent ThreatTrack Security research indicates having a CISO boosts a company’s confidence in defending against cybercrime. Companies with a CISO consider themselves better equipped to fight

Giving every company player network visibility to determine the root cause of anomalous behavior is – more often than not – complicated and confusing. And explaining that to non-IT stakeholders? Good luck. Part of the problem is the variety of different people who need information. The security,